期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
Exploration of Industrial Internet Security Technology and Application from the Perspective of Generative Artificial Intelligence
1
作者 Dinggao Li Shengda Liao Zhuo Zheng 《Journal of Electronic Research and Application》 2024年第6期170-175,共6页
In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technolog... In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technologies such as big models and generative artificial intelligence has become a hot research issue.In this regard,this paper briefly analyzes the industrial Internet security technology and application from the perspective of generative artificial intelligence,hoping to provide some valuable reference and reference for readers. 展开更多
关键词 Generative artificial intelligence Industrial Internet security technology Application
下载PDF
Development Status and Industrial Security Countermeasures of Maize Deep-processing Industry in Shandong Province--Based on the Actual Investigation in Five Cities and Counties of Shandong Province
2
作者 Hui WANG 《Asian Agricultural Research》 2018年第3期15-19,22,共6页
Corn deep processing industry is an important follow-up industry for corn production and processing. Shandong has numerous largescale corn processing enterprises and is one of the fast-growing regions in China for dee... Corn deep processing industry is an important follow-up industry for corn production and processing. Shandong has numerous largescale corn processing enterprises and is one of the fast-growing regions in China for deep processing of corn. The status of production and processing of corn in the major corn-producing areas of Shandong Province such as Dezhou,Liaocheng and Tai'an was investigated on the spot. It was found that the development of the corn industry in Shandong also has many problems,such as the mismatch between corn demand and production areas,the excessively small planting area of special corn and the poor communication between technology and demand,resulting in barriers in technology and raw materials in the production and processing links of corn and making it difficult to form a complete industrial chain system. According to the actual investigation,a highly efficient agricultural industry safety review mechanism was established based on the sound judgement of industrial safety to ensure the safety of the company's development,and at the same time,the interpretation and promotion of the strategy of going abroad was strengthened,so as to provide a full range of information services for corn processing enterprises and help to further develop and optimize the corn industry in Shandong. 展开更多
关键词 Corn industry security Development status Countermeasure analysis
下载PDF
Edge Computing Task Scheduling with Joint Blockchain and Task Caching in Industrial Internet
3
作者 Yanping Chen Xuyang Bai +3 位作者 Xiaomin Jin Zhongmin Wang Fengwei Wang Li Ling 《Computers, Materials & Continua》 SCIE EI 2023年第4期2101-2117,共17页
Deploying task caching at edge servers has become an effectiveway to handle compute-intensive and latency-sensitive tasks on the industrialinternet. However, how to select the task scheduling location to reduce taskde... Deploying task caching at edge servers has become an effectiveway to handle compute-intensive and latency-sensitive tasks on the industrialinternet. However, how to select the task scheduling location to reduce taskdelay and cost while ensuring the data security and reliable communicationof edge computing remains a challenge. To solve this problem, this paperestablishes a task scheduling model with joint blockchain and task cachingin the industrial internet and designs a novel blockchain-assisted cachingmechanism to enhance system security. In this paper, the task schedulingproblem, which couples the task scheduling decision, task caching decision,and blockchain reward, is formulated as the minimum weighted cost problemunder delay constraints. This is a mixed integer nonlinear problem, which isproved to be nonconvex and NP-hard. To solve the optimal solution, thispaper proposes a task scheduling strategy algorithm based on an improvedgenetic algorithm (IGA-TSPA) by improving the genetic algorithm initializationand mutation operations to reduce the size of the initial solutionspace and enhance the optimal solution convergence speed. In addition,an Improved Least Frequently Used algorithm is proposed to improve thecontent hit rate. Simulation results show that IGA-TSPA has a faster optimalsolution-solving ability and shorter running time compared with the existingedge computing scheduling algorithms. The established task scheduling modelnot only saves 62.19% of system overhead consumption in comparison withlocal computing but also has great significance in protecting data security,reducing task processing delay, and reducing system cost. 展开更多
关键词 Edge computing task scheduling blockchain task caching industrial security
下载PDF
One-Variable Attack on the Industrial Fault Classification System and Its Defense
4
作者 Yue Zhuo Yuri A.W.Shardt Zhiqiang Ge 《Engineering》 SCIE EI CAS 2022年第12期240-251,共12页
Recently developed fault classification methods for industrial processes are mainly data-driven.Notably,models based on deep neural networks have significantly improved fault classification accuracy owing to the inclu... Recently developed fault classification methods for industrial processes are mainly data-driven.Notably,models based on deep neural networks have significantly improved fault classification accuracy owing to the inclusion of a large number of data patterns.However,these data-driven models are vulnerable to adversarial attacks;thus,small perturbations on the samples can cause the models to provide incorrect fault predictions.Several recent studies have demonstrated the vulnerability of machine learning methods and the existence of adversarial samples.This paper proposes a black-box attack method with an extreme constraint for a safe-critical industrial fault classification system:Only one variable can be perturbed to craft adversarial samples.Moreover,to hide the adversarial samples in the visualization space,a Jacobian matrix is used to guide the perturbed variable selection,making the adversarial samples in the dimensional reduction space invisible to the human eye.Using the one-variable attack(OVA)method,we explore the vulnerability of industrial variables and fault types,which can help understand the geometric characteristics of fault classification systems.Based on the attack method,a corresponding adversarial training defense method is also proposed,which efficiently defends against an OVA and improves the prediction accuracy of the classifiers.In experiments,the proposed method was tested on two datasets from the Tennessee–Eastman process(TEP)and steel plates(SP).We explore the vulnerability and correlation within variables and faults and verify the effectiveness of OVAs and defenses for various classifiers and datasets.For industrial fault classification systems,the attack success rate of our method is close to(on TEP)or even higher than(on SP)the current most effective first-order white-box attack method,which requires perturbation of all variables. 展开更多
关键词 Adversarial samples Black-box attack Industrial data security Fault classification system
下载PDF
Security for Industrial Communication Systems
5
《可编程控制器与工厂自动化(PLC FA)》 2006年第8期31-33,共3页
B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maint... B. Remote Access to Stand-Alone Embedded Systems Industrial controllers, especially for power system and transportation applications, are often deployed as stand-alone systems in a geographically dispersed area. Maintenance and service costs of stand-alone embedded systems can be reduced when they can be 展开更多
关键词 DCOM IEC 61850 In OPC Security for Industrial Communication Systems
下载PDF
Security for Industrial Communication Systems
6
《可编程控制器与工厂自动化(PLC FA)》 2006年第7期29-31,共3页
B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later secti... B. Network Architectures This section describes the main types of industrial and utility communication network topologies and protocols, in preparation for the discussion of specific security issues in the later sections. Communication networks for industrial automation are typically built in hierarchi- 展开更多
关键词 Security for Industrial Communication Systems WORK PRO NODE
下载PDF
What Are the Strategic Industries that Must Be Given Priority?
7
作者 柳斌杰 《China Economist》 2011年第4期97-99,共3页
This paper presents the argument that the security of strategic industries is more important than financial security and lies at the heart of economic security. It further identifies the following industries as strate... This paper presents the argument that the security of strategic industries is more important than financial security and lies at the heart of economic security. It further identifies the following industries as strategic industries: sustenance industry, infrastructure industry, equipment industry, environmental industry and information industry. For the health and security of the national economy, this paper proposes that a priority must be placed on researching the security of strategic industries. 展开更多
关键词 security of strategic industries economic security
下载PDF
Security for Industrial Communication Systems
8
《可编程控制器与工厂自动化(PLC FA)》 2006年第9期26-27,共2页
D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sen... D.Security on the Field Bus and Device Level As described in SectionⅢ-B,Fig.2,in- dustrial communication networks involve a number of levels.The lowest level\is closest to the application specific devices such as sensors,meters,and actuators.A large number of specialized and partly proprietary commu- nication systems,media,and protocols can be found on this level.Most were developed at a time when security issues were of lesser con- cern than today,and when no practical secu- rity measures were available. 展开更多
关键词 Security for Industrial Communication Systems In LINE
下载PDF
Security for Industrial Communication Systems
9
《可编程控制器与工厂自动化(PLC FA)》 2006年第10期26-27,共2页
E. Security of Embedded Systems for Industrial Control and Communication Industrial automation controllers are typically implemented on embedded computers. Such embedded systems have to cope with restrictions on cost,... E. Security of Embedded Systems for Industrial Control and Communication Industrial automation controllers are typically implemented on embedded computers. Such embedded systems have to cope with restrictions on cost, real-time performance, power consumption, and other constraints which are even more demanding than in large workstations. A reference discusses these aspects with the example of a thermostat con- 展开更多
关键词 Security for Industrial Communication Systems In
下载PDF
A New Intrusion Detection Algorithm AE-3WD for Industrial Control Network
10
作者 Yongzhong Li Cong Li +1 位作者 Yuheng Li Shipeng Zhang 《Journal of New Media》 2022年第4期205-217,共13页
In this paper,we propose a intrusion detection algorithm based on auto-encoder and three-way decisions(AE-3WD)for industrial control networks,aiming at the security problem of industrial control network.The ideology o... In this paper,we propose a intrusion detection algorithm based on auto-encoder and three-way decisions(AE-3WD)for industrial control networks,aiming at the security problem of industrial control network.The ideology of deep learning is similar to the idea of intrusion detection.Deep learning is a kind of intelligent algorithm and has the ability of automatically learning.It uses self-learning to enhance the experience and dynamic classification capabilities.We use deep learning to improve the intrusion detection rate and reduce the false alarm rate through learning,a denoising AutoEncoder and three-way decisions intrusion detection method AE-3WD is proposed to improve intrusion detection accuracy.In the processing,deep learning AutoEncoder is used to extract the features of high-dimensional data by combining the coefficient penalty and reconstruction loss function of the encode layer during the training mode.A multi-feature space can be constructed by multiple feature extractions from AutoEncoder,and then a decision for intrusion behavior or normal behavior is made by three-way decisions.NSL-KDD data sets are used to the experiments.The experiment results prove that our proposed method can extract meaningful features and effectively improve the performance of intrusion detection. 展开更多
关键词 Industrial control network security intrusion detection deep learning AutoEncoder three-way decision
下载PDF
Analysis and Research on China′s Industrial Internet Security Development
11
作者 WANG Fangyuan 《International Journal of Plant Engineering and Management》 2022年第4期244-252,共9页
Under the new situation of"integration of industrialization and industrialization"in China,security situational awareness is an important means to solve the problems of unclear boundaries,multiple roles and ... Under the new situation of"integration of industrialization and industrialization"in China,security situational awareness is an important means to solve the problems of unclear boundaries,multiple roles and complex business relationships of industrial Internet.The main contents of the platform include industrial data collection,industrial protocol identification,industrial asset detection and industrial threat monitoring.Among them,risk prevention and detection,key data protection,cloud platform and identification resolution node protection are all important issues.On the one hand,escorting the industrial Internet business needs to summarize the industrial Internet network security data and master the network security situation from the overall perspective.On the other hand,it is also necessary to establish an industrial Internet platform security early warning and emergency response process system,promote the security rectification of industrial platform enterprises,find the security threats and risks that have been hidden in the industrial Internet platform for a long time,and provide perception and decision⁃making support for enterprises. 展开更多
关键词 industrial internet security situation awareness safety protection
下载PDF
Advancing Autoencoder Architectures for Enhanced Anomaly Detection in Multivariate Industrial Time Series
12
作者 Byeongcheon Lee Sangmin Kim +2 位作者 Muazzam Maqsood Jihoon Moon Seungmin Rho 《Computers, Materials & Continua》 SCIE EI 2024年第10期1275-1300,共26页
In the context of rapid digitization in industrial environments,how effective are advanced unsupervised learning models,particularly hybrid autoencoder models,at detecting anomalies in industrial control system(ICS)da... In the context of rapid digitization in industrial environments,how effective are advanced unsupervised learning models,particularly hybrid autoencoder models,at detecting anomalies in industrial control system(ICS)datasets?This study is crucial because it addresses the challenge of identifying rare and complex anomalous patterns in the vast amounts of time series data generated by Internet of Things(IoT)devices,which can significantly improve the reliability and safety of these systems.In this paper,we propose a hybrid autoencoder model,called ConvBiLSTMAE,which combines convolutional neural network(CNN)and bidirectional long short-term memory(BiLSTM)to more effectively train complex temporal data patterns in anomaly detection.On the hardware-in-the-loopbased extended industrial control system dataset,the ConvBiLSTM-AE model demonstrated remarkable anomaly detection performance,achieving F1 scores of 0.78 and 0.41 for the first and second datasets,respectively.The results suggest that hybrid autoencoder models are not only viable,but potentially superior alternatives for unsupervised anomaly detection in complex industrial systems,offering a promising approach to improving their reliability and safety. 展开更多
关键词 Advanced anomaly detection autoencoder innovations unsupervised learning industrial security multivariate time series analysis
下载PDF
A note on diagnosis and performance degradation detection in automatic control systems towards functional safety and cyber security 被引量:3
13
作者 Steven X.Ding 《Security and Safety》 2022年第1期2-30,共29页
This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems.It calls for more research attention... This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems.It calls for more research attention on three aspects:(i)application of control and detection uni ed framework to enhancing the diagnosis capability of feedback control systems,(ii)projection-based fault detection,and complementary and explainable applications of projection-and machine learning-based techniques,and(iii)system performance degradation detection that is of elemental importance for today's automatic control systems.Some ideas and conceptual schemes are presented and illustrated by means of examples,serving as convincing arguments for research e orts in these aspects.They would contribute to the future development of capable diagnosis systems for functionality safe and cyber secure automatic control systems. 展开更多
关键词 Diagnosis in automatic control systems Cyber security in industrial cyber physical systems Uni ed framework of control and detection Projection-based diagnosis Explainable application of ML-methods Performance degradation detection
原文传递
Promoting the Safe and Stable Development of Industrial and Supply Chains under the New Pattern of Development
14
作者 SHENG Chaoxun 《China Economic Transition》 2022年第3期320-348,共29页
It is an important component of national security,and also a required driver for coordinating development and security and building a new pattern of development to maintain the security and stability of and enhance th... It is an important component of national security,and also a required driver for coordinating development and security and building a new pattern of development to maintain the security and stability of and enhance the independent controllability of industrial and supply chains.According to the principles of taking enterprises as the mainstay,coordinating points and chains,combining advantages and disadvantages,adopting classified policies,and linking internal and external chains,the three industrial chains should be planned as a whole for the purpose of their coordinated and efficient operation,so as to solidly enhance,supplement,optimize,and consolidate industrial and supply chains,enhance support to the core links of industrial chains,exploit preponderant and advantageous links,accelerate the incubation of leading and hidden champion enterprises in the industrial ecology,promote the coordination between central and local governments,optimize the policy support system for the modernization of industrial chains,deepen international cooperation among industrial chains,expedite the construction of independent,controllable,safe,and efficient industrial and supply chains,and significantly improve the stability,international competitiveness,and modernization of China's industrial and supply chains. 展开更多
关键词 industrial chain supply chain new pattern of development security of industrial chain modernization of industrial chain
原文传递
A Study on the Path of Improving the Modernization Level of Industrial and Supply Chains
15
作者 Research Group of Institute of Industrial Economics of Chinese Academy of Social Sciences(CASS) ZHANG Qizi 《China Economic Transition》 2022年第3期349-387,共39页
is well known that a lot of studies have been conducted on the modernization of industrial and supply chains.However,scholars have not reached a consensus on the definition and dynamic mechanism of the improvement of ... is well known that a lot of studies have been conducted on the modernization of industrial and supply chains.However,scholars have not reached a consensus on the definition and dynamic mechanism of the improvement of the modernization level of industrial and supply chains yet.This paper clarifies the constituent factors of industrial and supply chains and defines the connotation of improvement of the modernization level of industrial and supply chains from the perspective of constituent subjects and structure according to the characteristics and requirements of the new era.Then,the paper proposes improving the modernization level of industrial and supply chains aiming to make it more adaptable to the requirements of Chinese development in a new stage,the increasing instability and uncertainty in the international environment,and a new round of technological change.To this end,the improvement of the modernization level of industrial and supply chains should embrace the further enhancement of the following dimensions:innovation capability,added value,sustainability,digitalization,safety and reliability,fairness,and smooth coordination.Based on the analysis of the upgrade types of the existing industrial and supply chains,this paper distinguishes the factors driving the improvement of the modernization level of industrial and supply chains from a basic level.It proposes four basic dynamic mechanisms,namely,final demand,factor supply,regional industrial cluster,and integration into the global industrial division system.Finally,the paper analyzes the working way of the four dynamic mechanisms and the main constraints they face,and based on this,put forward a path to break through the constraints. 展开更多
关键词 industrial chain supply chain modernization of industrial chain security of industrial chain
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部